Certified Ethical Hacking Introduction

This course includes lessons where you will learn what Ethical Hacking is, what the Certified Ethical Hacking Certification is and how to use these skills to become a paid security professional. This course is a starting point for you to chart your course to a well paying and satisfying Cyber Security career. This course will get you on the fast track to certification, and ultimately, relentlessly pursued by recruiters.

The demand for Certified Ethical Hackers, Cyber Security Engineers, Administrators, Consultants, Architects, Business Analysts, Project Managers, etc. is immense. The Certified Ethical Hacker certification is an attainable path to helping business protect their digital assets in the cloud and on-premise. You can do it!

Taking this course will help you to

Learn the basics of Ethical Hacking

Introduction to Certified Ethical Hacker subject matter

Learn hacking techniques through multiple hands-on examples in this course

Written and developed by leading EC-Council Certified Ethical Hacker - CEHv9 experts

Receive one-on-one online help & support

Unlimited, lifetime access to online course

Certificate of completion

Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device.

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Introduction

Ethical Hacking - Vulnerability Assessment

The First Steps in an Ethical Hack

Footprinting with Maltego

Penetration Testing

Cyber Attacks

Vulnerability Scanning Websites using Zed Attack

Wireless Hacking

Wireless Hacking

Incident Response

Incident Response

Network Sniffing Tools - Wireshark

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet.

Minimum specifications for the computer are:

Windows:

Microsoft Windows XP, or later

Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

Certified Ethical Hacking Introduction

This course includes lessons where you will learn what Ethical Hacking is, what the Certified Ethical Hacking Certification is and how to use these skills to become a paid security professional. This course is a starting point for you to chart your course to a well paying and satisfying Cyber Security career. This course will get you on the fast track to certification, and ultimately, relentlessly pursued by recruiters.

The demand for Certified Ethical Hackers, Cyber Security Engineers, Administrators, Consultants, Architects, Business Analysts, Project Managers, etc. is immense. The Certified Ethical Hacker certification is an attainable path to helping business protect their digital assets in the cloud and on-premise. You can do it!

Taking this course will help you to

Learn the basics of Ethical Hacking

Introduction to Certified Ethical Hacker subject matter

Learn hacking techniques through multiple hands-on examples in this course

Written and developed by leading EC-Council Certified Ethical Hacker - CEHv9 experts

Receive one-on-one online help & support

Unlimited, lifetime access to online course

Certificate of completion

Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device.

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Introduction

Ethical Hacking - Vulnerability Assessment

The First Steps in an Ethical Hack

Footprinting with Maltego

Penetration Testing

Cyber Attacks

Vulnerability Scanning Websites using Zed Attack

Wireless Hacking

Wireless Hacking

Incident Response

Incident Response

Network Sniffing Tools - Wireshark

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet.

Minimum specifications for the computer are:

Windows:

Microsoft Windows XP, or later

Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)